The destruction and fracture of rock masses are crucial components in engineering and there is an increasing demand for the study of the influence of rock mass heterogeneity on the safety of engineering projects. The numerical manifold method (NMM) has a unified solution format for continuous and discontinuous problems. In most NMM studies, material homogeneity has been assumed and despite this simplification, fracture mechanics remain complex and simulations are inefficient because of the complicated topology updating operations that are needed after crack propagation. These operations become computationally expensive especially in the cases of heterogeneous materials. In this study, a heterogeneous model algorithm based on stochastic theory was developed and introduced into the NMM. A new fracture algorithm was developed to simulate the rupture zone. The algorithm was validated for the examples of the four-point shear beam and semi-circular bend. Results show that the algorithm can efficiently simulate the rupture zone of heterogeneous rock masses. Heterogeneity has a powerful effect on the macroscopic failure characteristics and uniaxial compressive strength of rock masses. The peak strength of homogeneous material (with heterogeneity or standard deviation of 0) is 2.4 times that of heterogeneous material (with heterogeneity of 11.0). Moreover, the local distribution of parameter values can affect the configuration of rupture zones in rock masses. The local distribution also influences the peak value on the stress-strain curve and the residual strength. The post-peak stress-strain curve envelope from 60 random calculations can be used as an estimate of the strength of engineering rock masses.
Objective : Deep learning is a machine learning approach based on artificial neural network training, and object detection algorithm using deep learning is used as the most powerful tool in image analysis. We analyzed and evaluated the diagnostic performance of a deep learning algorithm to identify skull fractures in plain radiographic images and investigated its clinical applicability. Methods : A total of 2026 plain radiographic images of the skull (fracture, 991; normal, 1035) were obtained from 741 patients. The RetinaNet architecture was used as a deep learning model. Precision, recall, and average precision were measured to evaluate the deep learning algorithm's diagnostic performance. Results : In ResNet-152, the average precision for intersection over union (IOU) 0.1, 0.3, and 0.5, were 0.7240, 0.6698, and 0.3687, respectively. When the intersection over union (IOU) and confidence threshold were 0.1, the precision was 0.7292, and the recall was 0.7650. When the IOU threshold was 0.1, and the confidence threshold was 0.6, the true and false rates were 82.9% and 17.1%, respectively. There were significant differences in the true/false and false-positive/false-negative ratios between the anterior-posterior, towne, and both lateral views (p=0.032 and p=0.003). Objects detected in false positives had vascular grooves and suture lines. In false negatives, the detection performance of the diastatic fractures, fractures crossing the suture line, and fractures around the vascular grooves and orbit was poor. Conclusion : The object detection algorithm applied with deep learning is expected to be a valuable tool in diagnosing skull fractures.
Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.
Kim, Chung K.;Jun, Mina;Han, Jeongsoo;Kim, Miyea;Park, Jungung;Kim, Joshua Y.
Asia Marketing Journal
/
v.14
no.3
/
pp.7-26
/
2012
The success story of E-mart fascinated many academics and practitioners alike. Though E-mart began as a nameless discount store in Chang-dong, Seoul in 1993, it has transformed itself into a leading distribution company and one of the most powerful brands in Korea. Surprisingly, it achieved the great success against the two crises it met: the national economic crisis and the invasion of the global giant Walmart. The main objective of this case study is to formally examine how E-mart overcame the two crises. More specifically, this case study highlights the ways with which E-mart turned those difficulties into opportunities for growth. In our examination of the E-mart case, we could clearly see E-mart's competence and spirit that allowed it to turn crises into advantageous opportunities. E-mart attracted the customers who wanted value-oriented consumption by its positioning as the "Lowest price discount store", when consumer sentiment was frozen under the economic crisis. Furthermore, when a large-scale foreign discount store like Walmart entered the Korea market, E-mart built its core competencies as the 'Korean style discount store'. These ingenious positioning and efforts resulted in E-mart taking over their archrival, Walmart, and forced the global Goliath to exit the Korean market. The case of E-mart's effective crisis management teaches many important lessons and a few core lessons that apply to many companies. One such lesson is the importance of positioning which enabled E-mart to turn crises into opportunities. Granted, the strategy of positioning as the 'Korean style discount store', or 'Lowest price discount store' was possible due to overall support with cost reduction, development and management of their own system, an apprentice educate system, etc. based on an excellent selection of location of the store and efficient distribution systems. Still, the positioning strategy of E-mart was truly ground breaking in distancing itself from its competitors. The lessons from E-mart will help those companies currently in a stagnant situation or a crisis to turn their obstacles into great success.
International Journal of Computer Science & Network Security
/
v.23
no.11
/
pp.59-66
/
2023
Text mining (TM) is most widely used to find patterns from various text documents. Cyber-bullying is the term that is used to abuse a person online or offline platform. Nowadays cyber-bullying becomes more dangerous to people who are using social networking sites (SNS). Cyber-bullying is of many types such as text messaging, morphed images, morphed videos, etc. It is a very difficult task to prevent this type of abuse of the person in online SNS. Finding accurate text mining patterns gives better results in detecting cyber-bullying on any platform. Cyber-bullying is developed with the online SNS to send defamatory statements or orally bully other persons or by using the online platform to abuse in front of SNS users. Deep Learning (DL) is one of the significant domains which are used to extract and learn the quality features dynamically from the low-level text inclusions. In this scenario, Convolutional neural networks (CNN) are used for training the text data, images, and videos. CNN is a very powerful approach to training on these types of data and achieved better text classification. In this paper, an Ensemble model is introduced with the integration of Term Frequency (TF)-Inverse document frequency (IDF) and Deep Neural Network (DNN) with advanced feature-extracting techniques to classify the bullying text, images, and videos. The proposed approach also focused on reducing the training time and memory usage which helps the classification improvement.
The Journal of Economics, Marketing and Management
/
v.12
no.2
/
pp.73-81
/
2024
Purpose: South Korea is a close ally of the US and an important partner of China. Caught between the two most powerful countries, South Korea's strategic directions are critical. This article emphasizes that the deeper core of the US-China trade war is to improve the business environment to attract foreign direct investment (FDI) to boost the economy, rather than engaging in the trade war. Research design, data, and methodology: Considering the complexity of this issue, this article applies a systematic analytical tool, the ABCD (Agility, Benchmarking, Convergence, and Dedication) model, to provide strategic guidance for inducing investments into South Korea in the context of the ongoing US-China trade war. Results: Specifically, South Korea needs to provide a more attractive business environment along the four points: expedite commercial activities through deregulation (Agility); adopt global standards of the flexible labor markets and technological developments (Benchmarking); integrate various industries and connect them to global value chains (Convergence); and create more economy-friendly policies rather than politics-oriented ones such as protectionism (Dedication). Conclusion: This study stands out not just by utilizing the ABCD model but, also by providing more systematic analysis and practical implications, particularly within the context of the escalating US-China competition. Unlike many existing studies that analyze the broader impacts of this geopolitical rivalry, this research delves into specific strategic guidelines for South Korea to attract FDI. The findings also provide implications for multinational corporations (MNCs) in choosing the locations for their overseas operations, particularly in South Korea.
Ji Sun Park;Young-Woo Kim;Hyungdong Kim;Sun-Ki Kim;Kyeongsoon Park
Journal of Microbiology and Biotechnology
/
v.33
no.11
/
pp.1506-1512
/
2023
Quantitative analysis of adenosine triphosphate (ATP) has been widely used as a diagnostic tool in the food and medical industries. Particularly, the pathogenesis of a few diseases including inflammatory bowel disease (IBD) is closely related to high ATP concentrations. A bioluminescent D-luciferin/luciferase system, which includes a luciferase (FLuc) from the firefly Photinus pyralis as a key component, is the most commonly used method for the detection and quantification of ATP. Here, instead of isolating FLuc produced in recombinant Escherichia coli, we aimed to develop a whole-cell biocatalyst system that does not require extraction and purification of FLuc. To this end, the gene coding for FLuc was introduced into the genome of probiotic Saccharomyces boulardii using the CRISPR/Cas9-based genome editing system. The linear relationship (r2 = 0.9561) between ATP levels and bioluminescence generated from the engineered S. boulardii expressing FLuc was observed in vitro. To explore the feasibility of using the engineered S. boulardii expressing FLuc as a whole-cell biosensor to detect inflammation biomarker (i.e., ATP) in the gut, a colitis mouse model was established using dextran sodium sulfate as a colitogenic compound. Our findings demonstrated that the whole-cell biosensor can detect elevated ATP levels during gut inflammation in mice. Therefore, the simple and powerful method developed herein could be applied for non-invasive IBD diagnosis.
Journal of the Korean Society of Industry Convergence
/
v.27
no.1
/
pp.63-70
/
2024
Lithium-ion batteries (LIB) are widely used in various sectors, such as transportation (e.g., electric vehicles (EV)) and energy (e.g., energy storage facilities) due to their high energy density, broad operating temperature (-20 ℃ ~ 60 ℃), and high capacities. LIBs are powerful but fragile on external factors, including pressure, physical damage, overheating, and overcharging, that cause thermal runaway causing fires and explosions. During a LIB fire, a large amount of oxygen is generated from the decomposition of ionogenic materials. A water fire extinguisher that helps with cooling and suffocating must be essentially required at the same time. In fact, however, it is difficult to suppress LIB fires in the case of EVs because a LIB is installed with a battery pack housing that interrupts direct extinguishing by water. Thus, this study aims to investigate effective fire extinguishing measurements for LIB fires by using an EV. Relevant documents, including research articles and reports, were reviewed to identify effective ways of LIBs fire extinguishing. A real-scale fire experiment generating thermal runaway was carried out to figure out the combustion characteristics of EVs. This study revealed that the most effective fire extinguishing measurements for LIB fires are applying fire blankets and water tanks. However, there is still a lack of adequate regulation and guidelines for LIB fire extinguishment. Taking this into account, developing functional fire extinguishment measurements and available regulatory instruments is an urgent issue to secure the safety of firefighters and citizens.
Myounghoi Kim;Yohan Kim;Elsy Soraya Salas Silva;Michael Adisasmita;Kyeong Sik Kim;Yun Kyung Jung;Kyeong Geun Lee;Ji Hyun Shin;Dongho Choi
Annals of Hepato-Biliary-Pancreatic Surgery
/
v.27
no.4
/
pp.342-349
/
2023
Backgrounds/Aims: Liver organoids have emerged as a powerful tool for studying liver biology and disease and for developing new therapies and regenerative medicine approaches. For organoid culture, Matrigel, a type of extracellular matrix, is the most commonly used material. However, Matrigel cannot be used for clinical applications due to the presence of unknown proteins that can cause immune rejection, batch-to-batch variability, and angiogenesis. Methods: To obtain human primary hepatocytes (hPHs), we performed 2 steps collagenase liver perfusion protocol. We treated three small molecules cocktails (A83-01, CHIR99021, and HGF) for reprogramming the hPHs into human chemically derived hepatic progenitors (hCdHs) and used hCdHs to generate liver organoids. Results: In this study, we report the generation of liver organoids in a collagen scaffold using hCdHs. In comparison with adult liver (or primary hepatocyte)-derived organoids with collagen scaffold (hALO_C), hCdH-derived organoids in a collagen scaffold (hCdHO_C) showed a 10-fold increase in organoid generation efficiency with higher expression of liver- or liver progenitor-specific markers. Moreover, we demonstrated that hCdHO_C could differentiate into hepatic organoids (hCdHO_C_DM), indicating the potential of these organoids as a platform for drug screening. Conclusions: Overall, our study highlights the potential of hCdHO_C as a tool for liver research and presents a new approach for generating liver organoids using hCdHs with a collagen scaffold.
Purpose: The purpose of this study was to evaluate the relationship between cord blood adiponectin and insulin-like growth factor (IGF)-I and their effect on fetal growth and insulin resistance in mothers with gestational diabetes mellitus (GDM). Methods: Cord blood adiponectin and IGF-I were compared between mothers with GDM (GDM group, N=53) and controls (non-GDM group, N=101). Neonates were classified into three groups of small for gestational age (SGA, N=26), appropriate for gestational age (AGA, N=97), and large for gestational age (LGA, N=31) by birth weight. The association between cord adiponectin and IGF-I levels was evaluated in relation to maternal and neonatal clinical data. Results: Cord adiponectin was lower in the GDM group than in the non-GDM group (P<0.001). There was no significant difference in cord adiponectin among the SGA, AGA, and LGA groups in the GDM group (P=0.228). The cord adiponectin of AGA in the GDM group was significantly lower than that in the non-GDM group (P<0.001). The most powerful predictor affecting cord adiponectin was the result of maternal 75 g oral glucose tolerance test. The cord IGF-I values between the GDM group and the non-GDM group were not different (P=0.834). Neonates with the heavier birth weight had the higher cord IGF-I levels. The most powerful predictor affecting cord IGF-I was birth weight and the next was maternal parity. Conclusion: Both cord blood adiponectin and IGF-I were associated with fetal growth, but IGF-I was a more general and direct factor affecting fetal body size, and adiponectin seemed to have more association with insulin sensitivity than growth.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.